The police are increasingly getting search warrants for information about all cellphones in a certain location at a certain time: Police departments across the...Bruce SchneierFrom Schneier on Security | February 21, 2019 at 07:33 AM

At the end of January the US Department of Homeland Security issued a warning regarding serious DNS hijacking attempts against US government domains. Brian Krebs...Bruce SchneierFrom Schneier on Security | February 20, 2019 at 09:02 AM

Interesting -- although short and not very detailed -- article about Estonia's volunteer cyber-defense militia. Padar's militia of amateur IT workers, economists...Bruce SchneierFrom Schneier on Security | February 19, 2019 at 07:36 AM

It seems that someone from a company called Swift Recovery Ltd. is impersonating me -- at least on Telegram. The person is using a photo of me, and is using details...Bruce SchneierFrom Schneier on Security | February 18, 2019 at 03:42 PM

Beautiful photo of a three-inch-long squid. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read...Bruce SchneierFrom Schneier on Security | February 15, 2019 at 05:24 PM

It's only a prototype, but this USB cable has an embedded Wi-Fi controller. Whoever controls that Wi-Fi connection can remotely execute commands on the attached...Bruce SchneierFrom Schneier on Security | February 14, 2019 at 07:53 AM

I had not heard about this case before. Zurich Insurance has refused to pay Mondelez International's claim of $100 million in damages from NotPetya. It claims it...Bruce SchneierFrom Schneier on Security | February 13, 2019 at 07:32 AM

In his 2008 white paper that first proposed bitcoin, the anonymous Satoshi Nakamoto concluded with: "We have proposed a system for electronic transactions without...Bruce SchneierFrom Schneier on Security | February 12, 2019 at 07:25 AM

The Hawaiian Bobtail Squid's genome is half again the size of a human's. Other facts: The Hawaiian bobtail squid has two different symbiotic organs, and researchers...Bruce SchneierFrom Schneier on Security | February 8, 2019 at 05:37 PM

Gregory C. Allen at the Center for a New American Security has a new report with some interesting analysis and insights into China's AI strategy, commercial, government...Bruce SchneierFrom Schneier on Security | February 7, 2019 at 09:15 AM

In Gmail addresses, the dots don't matter. The account "[email protected]" maps to the exact same address as "[email protected]" and "b.r.u.c.e.schneier...Bruce SchneierFrom Schneier on Security | February 6, 2019 at 11:24 AM

Zcash just fixed a vulnerability that would have allowed "infinite counterfeit" Zcash. Like all the other blockchain vulnerabilities and updates, this demonstrates...Bruce SchneierFrom Schneier on Security | February 5, 2019 at 03:59 PM

The Wired headline sums it up nicely -- "Facebook Hires Up Three of Its Biggest Privacy Critics": In December, Facebook hired Nathan White away from the digital...Bruce SchneierFrom Schneier on Security | February 4, 2019 at 12:07 PM

Nice recipe. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here...Bruce SchneierFrom Schneier on Security | February 1, 2019 at 05:38 PM

Our work in cybersecurity is inexorably intertwined with public policy and­ -- more generally­ -- the public interest. It's obvious in the debates on encryption...Bruce SchneierFrom Schneier on Security | February 1, 2019 at 10:48 AM

A year ago, the Norwegian Consumer Council published an excellent security analysis of children's GPS-connected smart watches. The security was terrible. Not only...Bruce SchneierFrom Schneier on Security | January 31, 2019 at 11:30 AM

The security is terrible: In a very short limited amount of time, three vulnerabilities have been discovered: Wifi credentials of the user have been recovered (stored...Bruce SchneierFrom Schneier on Security | January 30, 2019 at 11:00 AM